Showing posts with label Penetration Test. Show all posts
Showing posts with label Penetration Test. Show all posts

Saturday, 21 December 2013

[TestingWhiz] Test Automation Tool


TestingWhiz™ is an easy, intuitive and affordable solution based on a robust FAST® automation engine. It uses effortless and intelligent recording techniques like keyword-driven testing, data driven testing, Excel inputs, object recorder and Java scripting to offer powerful test automation solutions like automated regression testing, cross browser testing, image comparison and language translation.

TestingWhiz easily automates the testing of your web applications on multiple browsers. Record the test case just once and play it back in any browser. TestingWhiz saves your time in doing manual testing for new browser versions. Supported browsers: Internet Explorer, Mozilla Firefox, Google Chrome, Safari and Opera.


System Requirements
Operating System : Windows XP/ Windows Vista/ Windows 7/ Windows 8
Processor : Intel Pentium 4 or later
RAM : 1 GB (2 GB Recommended)
Free Disk Space : 300 MB
Java Version : JRE 6 or later

Browser Support
Internet Explorer: Version 7, 8, 9 and l0
Mozilla Firefox: Version 3.6 to version 20
Google Chrome: Version 19 to version 29
Apple Safari: Version 5.x
Opera: Version 12.x

Friday, 20 December 2013

[Faraday] Penetration Test IDE


Faraday introduces a new concept (IPE) Integrated Penetration-Test Environment a multiuser Penetration test IDE. Designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

Features:

* +40 Plugins (Metasploit, Amap, Arachini, Dnsenum, Medusa, Nmap, Nessus, w3af, Zap and More!)
* Collaborative support 
* Information Highlighting 
* Knowledge Filtering 
* Information Dashboard 
* Conflict Detection 
* Support for multiple Workspaces 
* IntelliSense Support 
* Easy Plugin Development 
* XMLRPC, XML and Regex Parsers


Monday, 9 December 2013

[Evil Foca] IPv4 and IPv6 Penetration testing tool


Evil Foca is a tool for Pentesters and Security Auditors to perform security testing in IPv4/ IPv6 data networks.

  • The tool is capable to do different attacks such as:
  • MITM on IPv4 networks using ARP Spoofing and DHCP ACK injection.
  • MITM on IPv6 networks using Neighbor Advertisement Spoofing, SLAAC Attack, fake DHCPv6.
  • DoS (Denial of Service) on IPv4 networks using ARP Spoofing.
  • DoS (Denial of Service) on IPv6 networks using SLAAC Attack.
  • DNS Hijacking. 

[sb0x] Caja de herramientas para pruebas de penetración


Ruquirment Sistema: para ejecutar sb0x necesita instalar Python 2.7.x

Características Herramientas:

1. WordPress fuerza bruta
2. Escáner servidor
3. Web de administración buscador
4. FTP fuerza bruta del servidor
5. Perl bind shell
6. DSL fuerza bruta enrutador
7. NETGEAR fuerza bruta Router
8. MS12-020 de Windows RDP Dos explotar


Wednesday, 2 October 2013

[Kvasir] Tools for effective data management during a Penetration Test


Welcome to Kvasir! Herein these directories lay the groundwork tools for effective data management during a Penetration Test.

Penetration tests can be data management nightmares because of the large amounts of information that is generally obtained. Vulnerability scanners return lots of actual and potential vulnerabilitites to review. Port scanners can return thousands of ports for just a few hosts. How easy is it to share all this data with your co-workers?

That's what Kvasir is here to help you with. Here's what you'll need to get started:

  •     The latest version of web2py (http://www.web2py.com/)
  •     A database (PostgreSQL known to work)
  •     A network vulnerability scanner (Nexpose/Nmap supported)
  •     Additional python libraries

Kvasir is a web2py application and can be installed for each customer or task. This design keeps data separated and from you accidentally attacking or reviewing other customers.

This tool was developed primarily for the Cisco Systems Advanced Services Security Posture Assessment (SPA) team. While not every method used by the SPA team may directly relate we hope that this tool is something that can be molded and adapted to fit almost any working scenario.